Exam Details

  • Exam Code
    :312-50V11
  • Exam Name
    :EC-Council Certified Ethical Hacker (C|EH v11)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :528 Q&As
  • Last Updated
    :Apr 26, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-50V11 Questions & Answers

  • Question 171:

    which type of virus can change its own code and then cipher itself multiple times as it replicates?

    A. Stealth virus

    B. Tunneling virus

    C. Cavity virus

    D. Encryption virus

  • Question 172:

    which of the following protocols can be used to secure an LDAP service against anonymous queries?

    A. SSO

    B. RADIUS

    C. WPA

    D. NTLM

  • Question 173:

    Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by johnson in the above scenario?

    A. Host-based assessment

    B. Wireless network assessment

    C. Application assessment

    D. Distributed assessment

  • Question 174:

    What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?

    A. The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.

    B. Reveals the daily outgoing message limits before mailboxes are locked

    C. The internal command RCPT provides a list of ports open to message traffic.

    D. A list of all mail proxy server addresses used by the targeted host

  • Question 175:

    CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks like this:

    From: [email protected]

    To: [email protected] Subject: Test message

    Date: 4/3/2017 14:37

    The employee of CompanyXYZ receives your email message.

    This proves that CompanyXYZ's email gateway doesn't prevent what?

    A. Email Masquerading

    B. Email Harvesting

    C. Email Phishing

    D. Email Spoofing

  • Question 176:

    Jude, a pen tester, examined a network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process, he also estimated the threat of network security attacks and determined the level of security of the corporate network.

    What is the type of vulnerability assessment that Jude performed on the organization?

    A. External assessment

    B. Passive assessment

    C. Host-based assessment

    D. Application assessment

  • Question 177:

    What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

    A. Residual risk

    B. Impact risk

    C. Deferred risk

    D. Inherent risk

  • Question 178:

    ping-* 6 192.168.0.101

    Output:

    Pinging 192.168.0.101 with 32 bytes of data:

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

    Reply from 192.168.0.101:

    Ping statistics for 192.168.0101

    Packets: Sent = 6, Received = 6, Lost = 0 (0% loss).

    Approximate round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 0ms, Average = 0ms

    What does the option * indicate?

    A. t

    B. s

    C. a

    D. n

  • Question 179:

    Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company's network. He

    decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers

    unencrypted traffic in port UDP 161.

    what protocol is this port using and how can he secure that traffic?

    A. it is not necessary to perform any actions, as SNMP is not carrying important information.

    B. SNMP and he should change it to SNMP V3

    C. RPC and the best practice is to disable RPC completely

    D. SNMP and he should change it to SNMP v2, which is encrypted

  • Question 180:

    Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.

    Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.

    In this context, what can you say?

    A. Bob can be right since DMZ does not make sense when combined with stateless firewalls

    B. Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one

    C. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations

    D. Bob is partially right. DMZ does not make sense when a stateless firewall is available

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-50V11 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.